SlideShare a Scribd company logo
1 of 3
Part 1: Data Distribution Service
This series is made up of three parts. It focuses on Data Distribution Service
(DDS). DDS drives systems such as railways, autonomous cars, spacecraft, and
diagnostic imaging machines. It also handles luggage handling, military tanks, and
luggage handling. We will also review the current status of DDS and make
recommendations to enterprises for reducing the risks associated.
Let's start by discussing DDS and its use in different industries.
Overview
DDS is a standard middleware program that employs the publish-subscribe
paradigm. This software allows the creation of middleware layers that facilitate
machine-tomachine communication. This software is crucial for embedded systems
and applications with real-time requirements. DDS is maintained by the Object
Management Group (7 OMG)7 It's used in critical applications to provide a reliable
communication link between actuators and controllers.
DDS is at the beginning of the software supply chain. This makes it easy to become a
hacker target and makes it attractive. These agencies and companies are some of the
ones that use DDS. This isn't a complete list.
 National Aeronautics and Space Administration at Kennedy Space Center
 Siemens invests in wind power plants
 Bosch and Volkswagen to develop autonomous valet parking systems
 Both Nav Canada as well as European CoFlight can be used for air -traffic
control
DDS is a communication middleware that allows interoperability among programs from
all programming languages. DDS is a data-centric publishing and subscription protocol
that allows developers to create flexible shared data spaces for applications that
require two or more nodes to exchange typed data.
DDS is a great application programming interface (API), from a programmer's
perspective. DDS supports serialization and deserialization of any custom-built-in data
type via an interface language (IDL) in addition to plain byte streams, C -strings, and
C-strings.
DDS Applications
DDS is the foundation of other industry standards such as Op enFMB (smart grid
applications) or Adaptive AutoSAR, (smart grid applications). DDS is the default
middleware for Robot Operating System 2 ("ROS 2") which is the standard OS to
automate robotics and other technologies.
DDS can be used with Real-Time Publish -Subscribe (RTPS), to create high-quality
middleware layers that are mission-critical. DDS can be used for transporting artificial
intelligence (AI) from the electronic control unit to their steering motors.
Below is a collection of DDS-related examples. External resources provide estimates
of the number of devices within each sector or anticipated to be in the future.
Se ctor Example s Of Use Case s Notable use rs
Te le communications
ne tworks, and ne tworks
* Software-defined
Networking (SDN)
technologies
*Appliance-Life Cycle
*Management Tools (LCM),
which include 5G
* Fujitsu
De fe nse
* Command and control
(C&C) systems
* Radar systems and
navigation systems
* Starting systems
*National Aeronautics and
Space Administration
(NASA).
* NATO Generic Vehicle
Architecture (NGVA)15
* Spanish Army
Virtualization, Cloud
* Inter- and intra-
communications between
security operation centers
(SOC).
* VVIDIA
Ene rgy
* Distribution of power
generation
* Research
* GE Healthcare
* The Plug-and-Play
program for interoperability
with medical devices (MD
PnP)
M ining
* Precision mining
* Mining system automation
* Geological modeling
* Komatsu
* Diagramlogic
* Atlas Copco
Industrial inte rnet of
things (IIoT) and robotics
* Universal middleware
* Robot Operating System
(ROS 2)
* Robot by AWS
* IRobot
Public and Priv ate
Transportation
*Autonomous Vehicles
* Air Traffic Control
Railway manage me nt
*Control
*Volkswagen and Bosch16
* Coflight Consortium Selex-
SI Thales
* Nav Canada
Examining DDS Attack Fe asibility
Our experts reviewed DDS standards and discovered multiple security flaws. 13 new
CVE IDs for six of the most popular DDS implementations were created in November
2021. One vulnerability was also found in the standard specifications.
Over 100 companies were scanned across many industries. We also scanned research
and software companies from different countries. Some of these CVEs have been
identified and affected. Others were identified using nearly 90 90 ISP numbers and
other details.
We interviewed key DDS users, system integrations, and researchers in their research
areas to get their feedback on our findings. We then reviewed the specifications of
DDS, as well as six of the most active implementations worldwide that have millions of
deployments.
DDS is at the top of the software supply chain, making it an attractive target. Between
2020-2021, 66% of attacks focused on suppliers' code. During our research we found a
source-code repository host in a proprietary DDS implementation. If left open, this
would have allowed an attacker access to the source code (MITRE ATT&CK and
T0873).
DIGITAL DEVICES LTD
Long before Apple set an average consumers mindset to replacing their handheld gadgets in
two years, Digital Devices Ltd believed in Moore's law that computing will double every two
years. With our heritage from the days of IBM Personal Computer XT, our founders have gone
through the technology advancements of the 1990s and 2000s realizing that technology is an
instrumental part of any business's success. With such a fast pace industry, an IT department
can never be equipped with the tools and training needed to maintain their competitive edge.
Hence, Digital Devices has put together a team of engineers and vendor partners to keep up
with the latest industry trends and recommend clients on various solutions and options available
to them. From forming close relationships with networking and storage vendors like Juniper,
SolarWinds and VMWare to high-performance computing by HPE or AWS Cloud solutions,
Digital Devices Limited offers the latest technology solutions to fit the ever-growing needs of
the industry.
Our experts can guide you through the specifications and build cost efficiencies while providing
high end, state-of-the-art customer services. We research and analyses market and its current
demand and supply chain by offering wide range of bulk supplies of products like AKG C414
XLII, Shireen Cables DC-1021, Shireen Cables DC-2021, Dell p2419h monitor, Dell
U2419H, Dell P2719H, Dell P2219H, Lenovo 62A9GAT1UK, LG 65UH5F-H and Complete IT
Infrastructure products and services.

More Related Content

More from Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices

Forecasting Metaverse Threats: Will it Become Metaworse?
Forecasting Metaverse Threats: Will it Become Metaworse?Forecasting Metaverse Threats: Will it Become Metaworse?
Forecasting Metaverse Threats: Will it Become Metaworse?
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
XDR - The latest TLA or the Newest Cyber Shield.
XDR - The latest TLA or the Newest Cyber Shield.XDR - The latest TLA or the Newest Cyber Shield.
XDR - The latest TLA or the Newest Cyber Shield.
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
How Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business GrowthHow Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business Growth
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
A digital attack surface map is in order.
A digital attack surface map is in order.A digital attack surface map is in order.
A digital attack surface map is in order.
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
3 Reasons Manufacturers Are a Prime Target for Cyberattacks
3 Reasons Manufacturers Are a Prime Target for Cyberattacks3 Reasons Manufacturers Are a Prime Target for Cyberattacks
3 Reasons Manufacturers Are a Prime Target for Cyberattacks
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
No More Ransom - Six Years of Innovating to Fight Ransomware Together
No More Ransom - Six Years of Innovating to Fight Ransomware TogetherNo More Ransom - Six Years of Innovating to Fight Ransomware Together
No More Ransom - Six Years of Innovating to Fight Ransomware Together
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
2022 Cymulate Breaches Survey - Five Key Takeaways
2022 Cymulate Breaches Survey - Five Key Takeaways2022 Cymulate Breaches Survey - Five Key Takeaways
2022 Cymulate Breaches Survey - Five Key Takeaways
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
Manual user provisioning is dangerous
Manual user provisioning is dangerousManual user provisioning is dangerous
Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 

More from Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices (15)

Forecasting Metaverse Threats: Will it Become Metaworse?
Forecasting Metaverse Threats: Will it Become Metaworse?Forecasting Metaverse Threats: Will it Become Metaworse?
Forecasting Metaverse Threats: Will it Become Metaworse?
 
XDR - The latest TLA or the Newest Cyber Shield.
XDR - The latest TLA or the Newest Cyber Shield.XDR - The latest TLA or the Newest Cyber Shield.
XDR - The latest TLA or the Newest Cyber Shield.
 
How Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business GrowthHow Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business Growth
 
The Way Quantum Computing Will Change Encryption Forever
The Way Quantum Computing Will Change Encryption ForeverThe Way Quantum Computing Will Change Encryption Forever
The Way Quantum Computing Will Change Encryption Forever
 
A digital attack surface map is in order.
A digital attack surface map is in order.A digital attack surface map is in order.
A digital attack surface map is in order.
 
The thirst of a worker can cause toxic resumes
The thirst of a worker can cause toxic resumesThe thirst of a worker can cause toxic resumes
The thirst of a worker can cause toxic resumes
 
3 Reasons Manufacturers Are a Prime Target for Cyberattacks
3 Reasons Manufacturers Are a Prime Target for Cyberattacks3 Reasons Manufacturers Are a Prime Target for Cyberattacks
3 Reasons Manufacturers Are a Prime Target for Cyberattacks
 
No More Ransom - Six Years of Innovating to Fight Ransomware Together
No More Ransom - Six Years of Innovating to Fight Ransomware TogetherNo More Ransom - Six Years of Innovating to Fight Ransomware Together
No More Ransom - Six Years of Innovating to Fight Ransomware Together
 
Safeguarding Against the Five Stages Of a Ransomware Attack
Safeguarding Against the Five Stages Of a Ransomware AttackSafeguarding Against the Five Stages Of a Ransomware Attack
Safeguarding Against the Five Stages Of a Ransomware Attack
 
2022 Cymulate Breaches Survey - Five Key Takeaways
2022 Cymulate Breaches Survey - Five Key Takeaways2022 Cymulate Breaches Survey - Five Key Takeaways
2022 Cymulate Breaches Survey - Five Key Takeaways
 
How Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business GrowthHow Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business Growth
 
Manual user provisioning is dangerous
Manual user provisioning is dangerousManual user provisioning is dangerous
Manual user provisioning is dangerous
 
Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
 
What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?
 
Danger Debrief | June 2022
Danger Debrief | June 2022Danger Debrief | June 2022
Danger Debrief | June 2022
 

Part 1: Data Distribution Service

  • 1. Part 1: Data Distribution Service This series is made up of three parts. It focuses on Data Distribution Service (DDS). DDS drives systems such as railways, autonomous cars, spacecraft, and diagnostic imaging machines. It also handles luggage handling, military tanks, and luggage handling. We will also review the current status of DDS and make recommendations to enterprises for reducing the risks associated. Let's start by discussing DDS and its use in different industries. Overview DDS is a standard middleware program that employs the publish-subscribe paradigm. This software allows the creation of middleware layers that facilitate machine-tomachine communication. This software is crucial for embedded systems and applications with real-time requirements. DDS is maintained by the Object Management Group (7 OMG)7 It's used in critical applications to provide a reliable communication link between actuators and controllers. DDS is at the beginning of the software supply chain. This makes it easy to become a hacker target and makes it attractive. These agencies and companies are some of the ones that use DDS. This isn't a complete list.  National Aeronautics and Space Administration at Kennedy Space Center  Siemens invests in wind power plants  Bosch and Volkswagen to develop autonomous valet parking systems  Both Nav Canada as well as European CoFlight can be used for air -traffic control DDS is a communication middleware that allows interoperability among programs from all programming languages. DDS is a data-centric publishing and subscription protocol that allows developers to create flexible shared data spaces for applications that require two or more nodes to exchange typed data. DDS is a great application programming interface (API), from a programmer's perspective. DDS supports serialization and deserialization of any custom-built-in data type via an interface language (IDL) in addition to plain byte streams, C -strings, and C-strings. DDS Applications DDS is the foundation of other industry standards such as Op enFMB (smart grid applications) or Adaptive AutoSAR, (smart grid applications). DDS is the default middleware for Robot Operating System 2 ("ROS 2") which is the standard OS to automate robotics and other technologies. DDS can be used with Real-Time Publish -Subscribe (RTPS), to create high-quality middleware layers that are mission-critical. DDS can be used for transporting artificial intelligence (AI) from the electronic control unit to their steering motors.
  • 2. Below is a collection of DDS-related examples. External resources provide estimates of the number of devices within each sector or anticipated to be in the future. Se ctor Example s Of Use Case s Notable use rs Te le communications ne tworks, and ne tworks * Software-defined Networking (SDN) technologies *Appliance-Life Cycle *Management Tools (LCM), which include 5G * Fujitsu De fe nse * Command and control (C&C) systems * Radar systems and navigation systems * Starting systems *National Aeronautics and Space Administration (NASA). * NATO Generic Vehicle Architecture (NGVA)15 * Spanish Army Virtualization, Cloud * Inter- and intra- communications between security operation centers (SOC). * VVIDIA Ene rgy * Distribution of power generation * Research * GE Healthcare * The Plug-and-Play program for interoperability with medical devices (MD PnP) M ining * Precision mining * Mining system automation * Geological modeling * Komatsu * Diagramlogic * Atlas Copco Industrial inte rnet of things (IIoT) and robotics * Universal middleware * Robot Operating System (ROS 2) * Robot by AWS * IRobot Public and Priv ate Transportation *Autonomous Vehicles * Air Traffic Control Railway manage me nt *Control *Volkswagen and Bosch16 * Coflight Consortium Selex- SI Thales * Nav Canada Examining DDS Attack Fe asibility
  • 3. Our experts reviewed DDS standards and discovered multiple security flaws. 13 new CVE IDs for six of the most popular DDS implementations were created in November 2021. One vulnerability was also found in the standard specifications. Over 100 companies were scanned across many industries. We also scanned research and software companies from different countries. Some of these CVEs have been identified and affected. Others were identified using nearly 90 90 ISP numbers and other details. We interviewed key DDS users, system integrations, and researchers in their research areas to get their feedback on our findings. We then reviewed the specifications of DDS, as well as six of the most active implementations worldwide that have millions of deployments. DDS is at the top of the software supply chain, making it an attractive target. Between 2020-2021, 66% of attacks focused on suppliers' code. During our research we found a source-code repository host in a proprietary DDS implementation. If left open, this would have allowed an attacker access to the source code (MITRE ATT&CK and T0873). DIGITAL DEVICES LTD Long before Apple set an average consumers mindset to replacing their handheld gadgets in two years, Digital Devices Ltd believed in Moore's law that computing will double every two years. With our heritage from the days of IBM Personal Computer XT, our founders have gone through the technology advancements of the 1990s and 2000s realizing that technology is an instrumental part of any business's success. With such a fast pace industry, an IT department can never be equipped with the tools and training needed to maintain their competitive edge. Hence, Digital Devices has put together a team of engineers and vendor partners to keep up with the latest industry trends and recommend clients on various solutions and options available to them. From forming close relationships with networking and storage vendors like Juniper, SolarWinds and VMWare to high-performance computing by HPE or AWS Cloud solutions, Digital Devices Limited offers the latest technology solutions to fit the ever-growing needs of the industry. Our experts can guide you through the specifications and build cost efficiencies while providing high end, state-of-the-art customer services. We research and analyses market and its current demand and supply chain by offering wide range of bulk supplies of products like AKG C414 XLII, Shireen Cables DC-1021, Shireen Cables DC-2021, Dell p2419h monitor, Dell U2419H, Dell P2719H, Dell P2219H, Lenovo 62A9GAT1UK, LG 65UH5F-H and Complete IT Infrastructure products and services.